Preview

MGIMO Review of International Relations

Advanced search

FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY

https://doi.org/10.24833/2071-8160-2016-4-49-235-247

Abstract

The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany). The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

About the Author

E. S. Zinovieva
Moscow State Institute of International Relations (University)
Russian Federation

PhD in Political Science, associate Professor at the Department of World Politics,

76 Prospect Vernadskogo, Moscow, 119454



References

1. Бедрицкий А.В. Международные договорённости по киберпространству: возможен ли консенсус? // Проблемы национальной стратегии. 2012. №4. С. 119-136. URL: http://www.riss.ru/images/pdf/journal/2012/4/10_.pdf (проверено 22.08.2016 г.)

2. Болгов Р.В. Информационные технологии в современных вооруженных конфликтах и военных стратегиях // Дисс. … ученой степени кандидата политических наук. СПб: СПбГУ, 2011.

3. Демидов О.В. Обеспечение международной информационной безопасности и российские национальные интересы // Индекс Безопасности. 2013. № 1. С. 129-168. URL: http://www.pircenter.org/media/content/files/10/13559089230.pdf (проверено 22.08.2016 г.)

4. Коротков А.В., Зиновьева Е.С. Безопасность критических информационных инфраструктур м международном гуманитарном праве // Вестник МГИМО-Университета. 2011, №4.

5. Ибрагимова Г. Стратегия КНР в области управления Интернетом и информационной безопасности // Индекс безопасности. 2013. № 1. 169-184. URL: http://www.pircenter.org/media/content/files/10/13559074100.pdf (проверено 22.08.2016 г.)

6. Курбалиа Й. Управление Интернетом. М.: Координационный центр национального домена сети Интернет, 2010.

7. Федоров А.В. Информационная безопасность в мировом политическом процессе: учеб пособие. М.: МГИМО, 2006.

8. Busch M. L. Overlapping institutions, forum shopping, and dispute settlement in international trade // International Organization. 2007. №. 04. P. 735-761

9. Giles K., Hagestad W. Divided by a common language: cyber definitions in Chinese, Russian and English // Cyber Conflict (CyCon), 2013 5th International Conference on. IEEE, 2013. Pp. 1-17.

10. Haas P. Epistemic Communities and International-Policy Coordination - Introduction // International Organization. 1992. No. 46 (1). Pp. 1-35.

11. Lessig L. Code and other laws of cyberspace. NY: Basic books, 1999.

12. Lieberthal K., Singer P. Cybersecurity and U.S. - China Relations. Jonh L. Torton China Institute in Brookings, 2012. URL: https://www.brookings.edu/wp-content/uploads/2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf (проверено 22.08.2016 г.)

13. Rauscher K., Korotkov A.Working towards rules for governing cyber conflict.Rendering Geneva and Hague conventions in cyberspace // East-West institute. 2011. URLhttps://www.eastwest.ngo/idea/towards-rulesgoverning-cyber-conflict-0 (проверено 22.08.2016 г.)

14. Tallinn Manual on the International Law Applicable to Cyber Warfare / ed. by M.Schmitt – N.Y.: Cambridge University Press, 2013.


Review

For citations:


Zinovieva E.S. FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY. MGIMO Review of International Relations. 2016;(4(49)):235-247. (In Russ.) https://doi.org/10.24833/2071-8160-2016-4-49-235-247

Views: 1464


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2071-8160 (Print)
ISSN 2541-9099 (Online)